2012
DOI: 10.1007/978-3-642-31540-4_17
|View full text |Cite
|
Sign up to set email alerts
|

XSS-Dec: A Hybrid Solution to Mitigate Cross-Site Scripting Attacks

Abstract: Abstract. Cross-site scripting attacks represent one of the major security threats in today's Web applications. Current approaches to mitigate cross-site scripting vulnerabilities rely on either server-based or client-based defense mechanisms. Although effective for many attacks, server-side protection mechanisms may leave the client vulnerable if the server is not well patched. On the other hand, client-based mechanisms may incur a significant overhead on the client system. In this work, we present a hybrid c… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(3 citation statements)
references
References 14 publications
0
3
0
Order By: Relevance
“…Client and server hybrids. XSS-Dec [39] uses a proxy which keeps track of an encrypted version of the server's source files, and applies this information to derive exploits in a page visited by the user. This approach is similar to ours, since we assume previous knowledge of the clean HTML document.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Client and server hybrids. XSS-Dec [39] uses a proxy which keeps track of an encrypted version of the server's source files, and applies this information to derive exploits in a page visited by the user. This approach is similar to ours, since we assume previous knowledge of the clean HTML document.…”
Section: Related Workmentioning
confidence: 99%
“…Informally, the cause of XSS is a lack of input sanitization: user-chosen data "escapes" into a page's template and makes its way into the JavaScript engine, or modifies the DOM. Consequently, many of the XSS defenses published so far propose to fix the problem at the source, by properly separating the template from the user data on the server, or by modifying browsers [26,30,39,40]. There are also similar solutions that can be implemented in the front-end code of an application [25].…”
Section: Introductionmentioning
confidence: 99%
“…For example, there are many detection and prevention methods of SQL injection, they are either signature-based such in Shanmughaneethi et al (2009), behaviour-based (Pinzón et al, 2013), grammar-based (Bisht et al, 2010;Kemalis and Tzouramanis, 2008), or taint-based (Jan et al, 2010;Alazab et al, 2011;Tateishi and Tabuchi, 2007;Papagiannis et al, 2011). The XSS detection and prevention methods are also categorised in the same way as the SQL injection detection and prevention methods, they are either signaturebased (Shanmughaneethi et al, 2009), or behaviour-based (Sundareswaran and Squicciarini, 2012), or grammar-based (Chandra and Selvakumar, 2011), or taint-based (Avancini and Ceccato, 2010). In order to protect against CSRF attacks (also known as XSRF, 'sea surf', session riding, CSRF, hostile linking, and one-click attack), OWASP developed a server-side CSRF protection mechanism for Apache (called mod_csrfprotector), Java (called CSRFGuard) and PHP (called CSRF-protector-PHP).…”
Section: Figurementioning
confidence: 99%